First published: Mon Jul 23 2018(Updated: )
In Docker Skeleton Runtime for Apache OpenWhisk, a Docker action inheriting the Docker tag openwhisk/dockerskeleton:1.3.0 (or earlier) may allow an attacker to replace the user function inside the container if the user code is vulnerable to code exploitation.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache OpenWhisk | <=1.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-11757 is classified as a high severity vulnerability due to its potential to allow an attacker to execute arbitrary code within a vulnerable user's container.
To mitigate CVE-2018-11757, upgrade your Docker action to use a version of the Docker tag that is newer than openwhisk/dockerskeleton:1.3.0.
CVE-2018-11757 affects versions of Apache OpenWhisk up to and including 1.3.0.
It is highly advisable to avoid using openwhisk/dockerskeleton:1.3.0 or earlier versions due to the security risks posed by CVE-2018-11757.
CVE-2018-11757 allows an attacker to potentially replace the user function inside the container, leading to arbitrary code execution.